Now showing 1 - 10 of 37
No Thumbnail Available
Publication

Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context

, Silic, Mario

Shadow IT refers to the use of information technology (IT) solutions and systems without prior explicit organizational approval. In this research, we have investigated an important role of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context. Using the theory of organizational and individual inertia and status quo framework as theoretical lenses, we sought to explain the factors that form an individual's cognitive based inertia. Our study offers important insights into how inertia shapes and drives cognitive based inertia, which drives the behavioral intention to continue using Shadow IT. We suggest several new insights for theory and practitioners on how to better address the Shadow IT phenomenon with the objective that organizations are more agile, productive and efficient but at the same time, more compliant with information security policy requirements.

No Thumbnail Available
Publication

Improving warning messages adherence: can Maya Security Bot advisor help?

2019-06-18 , Silic, Mario

Despite several different methods that have been suggested to improve users’ adherence to warning messages, users are still left alone in their decision-making process and have to deal with possible negative consequences of their decisions. To improve warning message adherence and to help users make a more informed decision, supported by the social facilitation theory and following design-driven approach, we implemented a real-time security bot advisor Maya. We conducted an online experiment with 312 users. The results suggest significant improvement in the warning adherence (from 38 to 61%) with the highest effect on older users. We demonstrated that the security bot advisor can be of a great help in influencing a user’s decision-making process. We suggest several ways that our findings can be used by warning designers and provide new directions for future research.

No Thumbnail Available
Publication

The effects of the elaboration likelihood model on initial trust formation in financial advisory services

2018 , Silic, Mario , Ruf, Christian

Purpose In order for financial institutions to cope with increased competitive pressure from the financial technology companies, offering digital services such as a mobile service system (MSS) targeted for high net worth individuals (HNWIs) becomes critical. Despite long-term trustworthy relationships between HNWIs and financial advisors, studies suggest that the formation of initial trust poses a significant challenge. The purpose of this paper is to identify various features related to initial trust antecedents. Design/methodology/approach The study was conducted using the survey data, and employs variance-based structural equation modeling (SEM) techniques to test hypotheses. Findings The findings from a closed experiment with 107 participants suggest that compared to more traditional service systems, customers are more prone to the construct of service quality, and specifically professional, prompt, dependable and timely financial advice. Originality/value The study validated key constructs that positively influence the initial trust formation process and ultimately the intention to use in an MSS for the financial advisory. The authorts particularly emphasized the rebalancing and monitoring steps in the financial planning process between HNWIs and client advisors.

No Thumbnail Available
Publication

Factors driving unified communications and collaboration adoption and use in organizations

2016-02-23 , Silic, Mario , Back, Andrea

Purpose Purpose of this research paper is to reveal factors that drive the adoption and use of Unified Communications & Collaboration technology in Organizations. Design/methodology/approach We used quantitative method to survey 296 employees from 50 different countries by conducting and international study. Partial least squares (PLS)-method was used for the latent variables LVP-analysis. Findings We found that UTAUT constructs are mainly validated where results suggests that performance expectancy and social influence are the most influential drivers in employee acceptance and use of UC&C in organizations. Social presence, influence of peers and superiors are the main factors to take into consideration when implementation UC&C technology. Research limitations/implications Future research should incorporate multi-cultural and organizational culture dimensions Practical implications Our study reveals main adoption and use factors behind UC&C technology. Organizations should look at the best procedures and processes on how to motivate, encourage, and push their employees to use the UC&C technology which drives important economies of scale. Training, influence of colleagues, peers and superiors are the key drivers of a successful UC&C adoption. Originality/value Paper closes existing research gap and provides useful insights to organizations about the technology adoption and use factors of the UC&C technology. Our study reveals important decision making factors, to take into account, that play crucial role in the technology adoption.

No Thumbnail Available
Publication

Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance

2020-03-01 , Silic, Mario , Lowry, Paul Benjamin

We conducted a design-science research project to improve an organization’s compound problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal security training. To do so, we created a gamified security training system focusing on two factors: (1) enhancing intrinsic motivation through gamification and (2) improving security learning and efficacy. Our key theoretical contribution is proposing a recontextualized kernel theory from the hedonic-motivation system adoption model that can be used to assess employee security constructs along with their intrinsic motivations and coping for learning and compliance. A six-month field study with 420 participants shows that fulfilling users’ motivations and coping needs through gamified security training can result in statistically significant positive behavioral changes. We also provide a novel empirical demonstration of the conceptual importance of “appropriate challenge” in this context. We vet our work using the principles of proof-of-concept and proof-of-value, and we conclude with a research agenda that leads toward final proof-in-use.

No Thumbnail Available
Publication

Ambidextrous organization and agility in big data era: The role of business process management systems

2018 , Riccardo, Rialti , Giacomo, Marzi , Silic, Mario , Cristiano, Ciappei

No Thumbnail Available
Publication

Open Source Software Adoption: Lessons from Linux in Munich

2017-02-02 , Silic, Mario , Back, Andrea

It took 10 years for the city of Munich to migrate 15,000 PCs from Windows to the Linux operating system. Was it worth it? This article focuses on how to effectively cope with open source software (OSS) adoption in an organizational context. Based on the Linux in Munich case, the authors present challenges and risks for IT decision makers and propose recommendations for evaluating and calculating the risks of OSS adoption.

No Thumbnail Available
Publication

The Effects of a Gamified Human Resource Management System on Job Satisfaction and Engagement

2020-01-27 , Silic, Mario , Marzi, Giacomo , Caputo, Andrea , Bal, Matthijs

No Thumbnail Available
Publication

Evaluating the Role of Trust in Adoption: A Conceptual Replication in the Context of Open Source Systems

2018-03-01 , Silic, Mario , Barlow, Jordan , Back, Andrea

No Thumbnail Available
Publication

A new perspective on neutralization and deterrence: Predicting shadow IT usage

2017-12-01 , Silic, Mario , Barlow, Jordan B. , Back, Andrea

This study examines the role of neutralization and deterrence in discouraging employees from using Shadow IT: tools, services and systems used in an organization but not authorized by the IT department. Our study provides a unique contribution to the IT security literature by studying effects of neutralization on both intentions (self-reported) and actual behavior, as well as examining the role of shame as a mediator. We surveyed employees from four organizations and found that the “metaphor of the ledger” neutralization technique predicts Shadow IT intention and actual Shadow IT usage. We also find that neutralization and deterrence effects influence shame.